Mathematical Techniques in Cryptology—Editorial Thomas BethWilli GeiselmannRainer Steinwandt OriginalPaper 07 November 2005 Pages: 377 - 378
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold Mihir BellareAdriana Palacio OriginalPaper 23 December 2005 Pages: 379 - 396
On the bit security of the Diffie-Hellman key Ian F. BlakeTheo GarefalakisIgor E. Shparlinski OriginalPaper 07 November 2005 Pages: 397 - 404
Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model Yvonne HitchcockColin BoydJuan Manuel González Nieto OriginalPaper 07 November 2005 Pages: 405 - 438
Cryptographic implications of Hess' generalized GHS attack Alfred MenezesEdlyn Teske OriginalPaper 17 November 2005 Pages: 439 - 460
On the low hamming weight discrete logarithm problem for nonadjacent representations J.A. MuirD.R. Stinson OriginalPaper 17 November 2005 Pages: 461 - 472